Editorial, Vulnerabilities, Wireless security
January 20, 2016
Via: Russel EdwardsIn a pioneering move, cyber-security expert Bruce Schneier approached the risks linked to embedded systems as early as January 2014. Embedded systems cyber-security raised a certain amount of interest in 2015, and will represent an even hotter topic in 2016. […]
Editorial, Malware, Vulnerabilities
January 13, 2016
Via: Russel EdwardsMalvertising is the assigned term for malicious advertising, which represents the action of hijacking legitimate online advertising networks performed by malicious factors in order to inject their own malware-ridden advertisements into the said platforms. The usual shape malvertising takes is […]
Access control, Editorial, Privacy protection
January 6, 2016
Via: Russel EdwardsAll good passwords have to meet a double condition: hard to guess, yet unforgettable in what their owner is concerned. Even more, how do you achieve that? Obviously, many password users fail at choosing the best virtual key for their […]
Cyber-crime, Data loss, Editorial
December 30, 2015
Via: Russel EdwardsThis year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the […]
December 23, 2015
Via: Russel EdwardsSearching for the optimum cyber-security defense configuration lead to the idea of employing machine learning in this field. Enterprises and researchers have regrouped their strategies in the aftermath of each and every notorious breach and attack, only to realize that […]
December 17, 2015
Via: Russel EdwardsActing as a cyber-security defense line, user behavior analytics (UBA) consist of monitoring the human behavior patterns that emerge from interacting with an IT system, establishing the normal zone and identifying any anomalies that could signal vulnerabilities or threats. This […]
December 9, 2015
Via: Russel EdwardsWireless or radio frequency wireless jamming designates the intentional activity of disrupting radio signals in order to disable any transmission that uses radio waves to circulate data or commands to and from RF devices. When used for malicious purposes, this […]
December 4, 2015
Via: Russel EdwardsLet’s open our Dark Web discussion with a question: just how much of the entire Internet would you think is accessible via the usual search engines? Take a wild guess. We have conducted our own mini-inquiry based on this question, and […]
November 25, 2015
Via: Russel EdwardsOn June 15, 2015 the Consumer Watchdog group from Santa Monica, CA addressed a petition to the FCC regarding the way “edge” providers honor the “do not track request”. By “edge providers” the group has in mind entities such as […]
Access control, Cyber warfare, Editorial, Privacy protection
November 18, 2015
Via: Russel EdwardsThe encryption debate reads the following way: while the logic of cyber-security and its encryption tools forecasts an impenetrable encryption, the government is worried that such an efficient cyber feature would block the law enforcers. Although creating a relative paradox, […]
November 11, 2015
Via: Russel EdwardsA survey on smart home and cyber-security, entitled “Behind our Digital Doors: Cybersecurity and the Connected Home”, revealed among other facts that 67% of the respondents possess between 1 and 5 Internet connected home devices, while 30% have 6 or […]
Editorial, Hacker, Vulnerabilities
November 5, 2015
Via: Russel EdwardsThe EMV card comes with enhanced security features, but also with particular vulnerabilities. Since this type of credit cards has been utilized for a while in Europe and in other regions of the globe, the cyber-attackers have already developed various […]
October 29, 2015
Via: Russel EdwardsIn our article on organizational doxing we mentioned social engineering with a promise on detailing this subject. The connection is straightforward – malicious digital entities use doxing as part of their social engineering maneuvers. However, what does social engineering mean? […]
Editorial, Identity theft, Privacy protection
October 21, 2015
Via: Russel EdwardsIt often occurs in the aftermath of a severe data breach that cyber-security analysts talk about the attacked system as not being secured enough, because it did not use multi-factor authentication. Abbreviated MFA, multi-factor authentication is actually 2FA in most […]
October 16, 2015
Via: Russel EdwardsAs a particular type of phishing attack, spear phishing targets from the preliminary phase a certain group, company or organization, with the intent of data stealing. The final goal might be facilitated by an identified or generic weak entry point […]
October 8, 2015
Via: Russel EdwardsThe Safe Harbor Agreement is an U.S. – EU agreement between the European Commission and the United States Department of Commerce by virtue of which a Safe Harbor list is open for U.S. organizations. Once businesses meet the conditions and join […]
Data loss, Editorial, Privacy protection
October 6, 2015
Via: Russel EdwardsDoxing (doxxing) – the word – is a neologism that dates back to the 90s, when Usenet’s members posted personal information on fellow users. It basically represents the idea of compiling and releasing digital documents that lead to identity revelation […]
Access control, Cloud security, Editorial
September 29, 2015
Via: Russel EdwardsSoftware Defined Perimeter (SDP) is a new security approach currently standardized by the #cloud security alliance (#csa). The concept is basically offering an air-gapped network – in a virtual version, so that sensitive data might be secured and companies detaining […]
Cyber-crime, Editorial, Malware
September 23, 2015
Via: Russel Edwards#ransomware is an actual cyber – phenomenon. First brought to attention in 1989 (the AIDS Trojan or PC Cyborg), then mentioned somewhere back in 2005 (Trojan.Gpcoder, then the Archiveus Trojan in 2006 that combined ransomware with RSA encryption), 2014 seems […]
Editorial, Privacy protection, Security
September 16, 2015
Via: Russel EdwardsAlso known as keystroke or typing dynamics, keystroke profiling translates into associating an individual with his/hers way of interacting with an interface via a keyboard or another device of input. This identification method can serve for authentication (it belongs to […]